UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-11988 GEN002040 SV-38249r1_rule ECCD-1 ECCD-2 High
Description
The .rhosts, .shosts, hosts.equiv, and shosts.equiv files are used to configure host-based authentication for individual users or the system. Host-based authentication is not sufficient for preventing unauthorized access to the system.
STIG Date
HP-UX 11.23 Security Technical Implementation Guide 2015-06-12

Details

Check Text ( C-36421r1_chk )
Check for the existence of the files.

# find / -type f -name .rhosts
# find / -type f -name .shosts
# find / -type f -name hosts.equiv
# find / -type f -name shosts.equiv

If .rhosts, .shosts, hosts.equiv, or shosts.equiv are found, this is a finding.
Fix Text (F-31760r1_fix)
Remove the .rhosts, .shosts, hosts.equiv, and/or shosts.equiv files.